Podcast
Questions and Answers
Which of the following are examples of security goals in computer systems?
Which of the following are examples of security goals in computer systems?
- Integrity, Availability, Anonymity
- Authentication, Authorization, Anonymity
- Confidentiality, Integrity, Availability (correct)
- Confidentiality, Authentication, Authorization
What is the challenge in achieving computer security?
What is the challenge in achieving computer security?
- Finding a balance between authentication and authorization
- Finding a balance between confidentiality and availability (correct)
- Finding a balance between assurance and authenticity
- Finding a balance between integrity and anonymity
What do we need to do in order to mitigate the risks to computing systems?
What do we need to do in order to mitigate the risks to computing systems?
- Learn about threats, vulnerabilities, and mechanisms to reduce or block threats (correct)
- Learn about assurance, authenticity, and anonymity
- Learn about confidentiality, integrity, and availability
- Learn about authentication, authorization, and anonymity
What are vulnerabilities?
What are vulnerabilities?
What are the security goals AAA?
What are the security goals AAA?